Cryptography from Noisy Storage

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography from noisy storage.

We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To il...

متن کامل

Robust cryptography in the noisy-quantum-storage model

It was shown in [42] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be implemented using quantumkey-distribution (QKD) hardware in the practical setting where honest participants are unable to perform noise-free operations. We derive trade-o...

متن کامل

Position-Based Cryptography from the Noisy Channels

We study the problem of constructing secure positioning protocols (Sastry et. al, 2003). Informally, the goal of such protocols is to enable a party P to convince a set of verifiers about P ’s location in space, using information about the time it takes P to respond to queries sent from different points. It has been shown by Chandramn et al (2009) that in general such task is impossible to achi...

متن کامل

Noisy channels and cryptography

These notes were written for a combined undergraduate/graduate cryptography course. This material can mostly be found in the text assigned to the graduate students, Codes and Cryptography by Dominic Welsh, but not in the text assigned to the undergraduates, Introduction to Cryptography with Coding Theory by Trappe and Washington. These notes are meant to fill the gap for the undergraduate stude...

متن کامل

Quantum Cryptography in Noisy Channels

We provide a complete proof of the security of quantum cryptography against any eavesdropping attack including coherent measurements even in the presence of noise. Polarization-based cryptographic schemes are shown to be equivalent to EPR-based schemes. We also show that the performance of a noisy channel approaches that of a noiseless one as the error rate tends to zero. (i.e., the secrecy cap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review Letters

سال: 2008

ISSN: 0031-9007,1079-7114

DOI: 10.1103/physrevlett.100.220502